Please enable JavaScript.
Coggle requires JavaScript to display documents.
risk management (Security and Risk Management (Risk Management Process…
risk management
Security and Risk Management
levels p83
Information Security p84
Components of an Information System p85
Balancing Information Security and Access p86
Assets to Protect p104
Threats p105
Asset Protection p109
Damage Control p110
Business Continuity Plan p111
Risk Management Process p112
Risk Assessment
Loose Risk Assessment p112
Firm Risk Assessment p113
Risk Mitigation
options p119
Methodology p119
Cost-Benefit Analysis p121
RM Evaluation
Residual Risk p123
Evaluation and Assessment p124
risk management
definition p12
goal p12
Integrating Security to RM p13
RM Methodology p14
Access Control
Introduction p16
elements
Authentication p19
Identification p18
Authorization p50
Accountability
types
administrative controls p45
technical controls p46
physical controls p47
models
Discretionary Access Control p51
Access Control Matrix Model p54
ACM Implementation p58
Authorization Table p59
Capabilities (rows) p61
Access control lists (columns) p60
Basic Operations p63
additional features
Positive vs. negative p66
Implicit vs. explicit p67
Role Based Access Control p70
Advantages p74
Mandatory Access Control p69
Attribute-based access control
Information Systems Security
function P4
elements
confidentiality P5
integrity P6
availability P7
more related terms
identification P8
authentication P8
authorization P8
survivability P9
privacy P9
non-repudiation P10
anonymity P10
recovery P10
Single Sign-On(SSO)
definition p24
example
kerberos p25